Onion pi in cubesat=outernet

the onion router net is most famous and helpful hidden service
add onion pi in cubesat… outernet pleas for russian peoples and mh17 die is guilty putin censorchip
Feel like someone is snooping on you? Browse anonymously anywhere you go with the Onion Pi Tor proxy. This is fun weekend project that uses a Raspberry Pi, a USB WiFi adapter and Ethernet cable to create a small, low-power and portable privacy Pi.
Brazilian presents secure router using Raspberry Pi that can be used in demonstrations

The Onion Pi Rev BR is a Brazilian version (enlarged and extra features) of Onion Pi.
Onion pi rev en
While the little Onion original Pi is geared to make anonymous (routing via TOR) connections on a LAN, the Onion Pi Rev BR is larger and has expanded its scope: through an internal battery, sturdy sealed box, and embedded 4G temperature control, it can be placed in a backpack and used as router or access point during an event or public display, for example.

The Brazilian Jose Damico demonstrated in Hope X hacker event in New York, one of his best creations. This is a complete router-based Raspberry Pi project and Onion Pi, the Adafruit.
The router named Onion Pi Rev BR has a unique construction that involves a battery, a circuit overload protection, a source, a 4G modem internal and external antenna, enclosure, the temperature sensor and ethernet and serial interfaces. The Onion Pi connects the Tor anonymizing network, ensuring a safer navigation.
According to Joseph, the internal battery supports 26 hours. In practice it works as a mobile router, ideal for taking on trips and events.
Using it is easy-as-pie. First, plug the Ethernet cable into any Internet provider in your home, work, hotel or conference/event. Next, power up the Pi with the micro USB cable to your laptop or to the wall adapter. The Pi will boot up and create a new secure wireless access point called Onion Pi. Connecting to that access point will automatically route any web browsing from your computer through the anonymizing Tor network.

Who is this good for?
If you want to browse anonymously on a netbook, tablet, phone, or other mobile or console device that cannot run Tor and does not have an Ethernet connection. If you do not want to or cannot install Tor on your work laptop or loan computer. If you have a guest or friend who wants to use Tor but doesn’t have the ability or time to run Tor on their computer, this gift will make the first step much easier.

What is Tor?
Tor is an onion routing service - every internet packet goes through 3 layers of relays before going to your destination. This makes it much harder for the server you are accessing (or anyone snooping on your Internet use) to figure out who you are and where you are coming from. It is an excellent way to allow people who are blocked from accessing websites to get around those restritions.

According to the Tor website:
Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they’re in a foreign country, without notifying everybody nearby that they’re working with that organization.

Groups such as Indymedia recommend Tor for safeguarding their members’ online privacy and security. Activist groups like the Electronic Frontier Foundation (EFF) recommend Tor as a mechanism for maintaining civil liberties online. Corporations use Tor as a safe way to conduct competitive analysis, and to protect sensitive procurement patterns from eavesdroppers. They also use it to replace traditional VPNs, which reveal the exact amount and timing of communication. Which locations have employees working late? Which locations have employees consulting job-hunting websites? Which research divisions are communicating with the company’s patent lawyers?

A branch of the U.S. Navy uses Tor for open source intelligence gathering, and one of its teams used Tor while deployed in the Middle East recently. Law enforcement uses Tor for visiting or surveilling web sites without leaving government IP addresses in their web logs, and for security during sting operations.

branko and syed post in my post pleas

hardware is logic if hardware or else software is update 10 for month,hardware is more than stable than a software of today… if software is good idea is not a junk

onion pi

onion pi rev br + laptop and cable usb

is two link of you rwquest for me

you use google transtale…cool a the video.

Russia’s Interior Ministry has posted a tender seeking parties willing to “study the possibility of obtaining technical information about users (user equipment) TOR anonymous network".

The tender appears to be open only to organisations rated to do secret work for the Russian government, but concluding that means the project has political aims may not be sensible.

The local Pirate Party told Global Voices they think the project’s origin in the Interior Ministry, rather than a military or intelligence agency, is a sign that pornography is the tender’s real target.

It’s not unknown for governments to use agencies of convenience to get things done. Government agencies around the world are often terrible at sharing information and assets, as shown by the current push for re-use of code in “government app stores”.

So perhaps this really is the Interior Ministry acting without thought to Russia’s less-than-encouraging attitude to political views which are at variance with the ruling party’s.

Whatever the aim of the project, there’s 3,900,000 roubles - $US 111,000 or £65,500 - up for grabs.
Russia offers 3.9m roubles for 'research to identify users of Tor’
Analysts say tender for research on service that anonymises browsing sends signal to online community amid crackdown on Russian internet
Share 498

Alec Luhn in Moscow
theguardian.com, Friday 25 July 2014 19.03 BST
Jump to comments (661)
Anti-corruption crusader Alexei Navalny’s blog was blocked in March
Anti-corruption crusader Alexei Navalny’s blog was blocked by Russian authorities in March. Users in Russia can now only access the site through services like Tor. Photograph: Grigory Dukor/Reuters
Russia’s interior ministry has offered up to 3.9m roubles (£65,000) for research on identifying the users of the anonymous browsing network Tor, raising questions of online freedom amid a broader crackdown on the Russian internet.

The interior ministry’s special technology and communications group published a tender earlier this month on the government procurement website offering the sum for “research work, Tor cipher”.

Before changes to the tender were published on Friday, numerous news outlets reported that it originally sought “research work on the possibility to obtain technical information about users (user equipment) of the anonymous network Tor”.

According to Andrei Soldatov, an expert on surveillance and security services, the interior ministry might be exploring possible ways to restrict Tor. But the fact that the tender was publicly announced meant that those seeking greater government control of the internet had defined their next target and were sending “yet another signal” to the online community, he argued.

“It’s not important if the Russian government is able to block Tor or not,” Soldatov said. “The importance is that they’re sending signals that they are watching this. People will start to be more cautious.”

The interior ministry refused to comment on Friday afternoon.

Originally developed by the US Naval Research Laboratory as an “onion routing project”, Tor is a network of virtual tunnels that allows users to hide the source and destination of their internet browsing and keeps websites from tracking them. It is often used by whistleblowers and residents of countries where the authorities restrict access to the internet, but has also been known to be used for criminal activity. A famous example was the Tor-based online market Silk Road, which was known as an “eBay for drugs” before the FBI shut it down in 2013.

Although many news outlets reported on the recent tender as a reward for “cracking Tor”, internet security experts doubted Tor could be successfully decrypted, let alone for a mere 3.9m roubles.

Of all countries, the fifth largest contingent of Tor users come from Russia, where the network’s popularity more than doubled in June, going from about 80,000 directly connecting users to more than 210,000. The growth followed a “bloggers law” – signed by the president, Vladimir Putin, in May – requiring any site with more than 3,000 visitors daily to register with the government. Media experts argued that the legislation would stifle opposition voices and restrict government criticism on the internet.

The move was part of a wider campaign to regulate the internet which saw the authorities block three major opposition news sites as well as the blog of anti-corruption crusader Alexei Navalny in March. Users located in Russia can now only access the news sites through anonymising services such as Tor.

This week, Putin signed a law requiring internet companies to store Russian user data in-country, where intelligence services enjoy sweeping access to electronic information through telecoms companies. Critics worry that websites such as Facebook and Twitter, which the opposition used to organise a string of huge rallies in 2011-2013, would be forced to stop operating in Russia when it comes into effect in 2016.

Unlike the Chinese system of internet censorship, which directly blocks websites such as Google, the Russian one is built on intimidation so that users “themselves become more cautious, and internet companies think up ways to block certain sites,” Soldatov said.

But blogger, journalist and web entrepreneur Anton Nosik doubted that the Tor research tender would have any effect, arguing that the interior ministry was not a serious player among the various government agencies surveilling the internet but was now “trying to make a name for itself”.

“The only significance [of the tender] is the money being paid and the PR surrounding it, showing that the ministry of interior is seriously working on issues of anonymising technology, so that everybody’s talking about it. And everybody is talking about it,” Nosik said.

More worrying, Nosik said, was leading communications provider Rostelecom’s investment in Deep Packet Inspection technology that would filter web traffic based on its content rather than its source. This would severely reduce users’ anonymity on the web, although Tor should be able to somewhat limit DPI capabilities, Nosik said.
kill the putin!!!???

As an fyi, our initial build is using an rPi. With the new B+, there would be more than enough ports to support Onion Pi and Outernet. Unless I’m misunderstanding something, the TOR use case is very different than that of Outernet. When receiving Outernet transmissions, there is no log kept of packets received on any router or server in the world.

But I do see TOR as a complementary tool when it comes to freedom of expression, since Outernet focuses on universal information access. Outernet allows users to consume content in anonymity, and if they choose to express themselves as a response, TOR is probably the best avenue (in places where freedom of expression is limited).

1ºstep: onion pi and outernet is good fusion, fame for tor and outernet…
2ºstep: tor not use ip and one way outernet use one censorchip cable and cubesat outernet is good for all side to kill censorchip and secure for people
3ºstep: tor and non-tor antenna for put by nsa,putin… and anybody atenna and spying your…
4ºstep:onion pi and onion pi rev br is open source… linker open source with open source… all person like for fusion of two project open source is a new time change
5ºstep:tor is most famous than outernet use this fame and tor volunter and tor dev for help outernet.
6ºstep:the deep net is famous than see in megaman battle network like his name of "undernet"
7ºstep:ip is dangerous; not for virus and malware; what for ipv4 and ipv8 is not compatible use ip second option and tor use tor is first option
8ºstep:tor is secure end to end
9ºstep:onion pi+cubesat is good idea for sell all people buy one
10ºstep:i a deeb net(tor) user for seek a the .onion

your @Syed misunderstanding is a hardware connect in input and output of internet is criptograph a a outernet and is all compatible is a all open source hardware…yes like cubesat As an fyi, our initial build is using an rbPi(compatible and onion pi is a made a rPi).With the new B+, there would be more than enough ports(one) to support Onion Pi and Outernet(use the same port).When receiving Outernet transmissions, there is no log kept of packets received on any router or server in the world.(nsa,putin,ect… is can make one;use onion pi is good idea)

@raiogam Keep in mind that transmissions from Outernet is public, so nobody has to watch your antenna to know what you are receiving. They only need to know that you have an antenna and that you are tuned into Outernet. Everyone receives the same things, so there’s nothing personally identifiable in the signal we will send. Wi-Fi hotspots on the ground are a different story, but again, since you won’t be submitting any data to Internet, it’s not so relevant.

Biggest threat to Outernet is not the kind of spying that is currently popular on Internet. Biggest threat is signal jamming.